US20190370716A1 - Intelligent diversification tool - Google Patents
Intelligent diversification tool Download PDFInfo
- Publication number
- US20190370716A1 US20190370716A1 US15/991,073 US201815991073A US2019370716A1 US 20190370716 A1 US20190370716 A1 US 20190370716A1 US 201815991073 A US201815991073 A US 201815991073A US 2019370716 A1 US2019370716 A1 US 2019370716A1
- Authority
- US
- United States
- Prior art keywords
- portfolio
- acquirer
- data
- tool
- engine
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/06—Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
- G06Q10/063—Operations research, analysis or management
- G06Q10/0637—Strategic management or analysis, e.g. setting a goal or target of an organisation; Planning actions based on goals; Analysis or evaluation of effectiveness of goals
- G06Q10/06375—Prediction of business process outcome or impact based on a proposed change
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/06—Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
- G06Q10/063—Operations research, analysis or management
- G06Q10/0635—Risk analysis of enterprise or organisation activities
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/24—Querying
- G06F16/245—Query processing
- G06F16/2458—Special types of queries, e.g. statistical queries, fuzzy queries or distributed queries
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/24—Querying
- G06F16/245—Query processing
- G06F16/2458—Special types of queries, e.g. statistical queries, fuzzy queries or distributed queries
- G06F16/2465—Query processing support for facilitating data mining operations in structured databases
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06N—COMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N20/00—Machine learning
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06N—COMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N7/00—Computing arrangements based on specific mathematical models
-
- G06N99/005—
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/06—Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
- G06Q10/067—Enterprise or organisation modelling
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06N—COMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N3/00—Computing arrangements based on biological models
- G06N3/02—Neural networks
- G06N3/08—Learning methods
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06N—COMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N5/00—Computing arrangements using knowledge-based models
- G06N5/01—Dynamic search techniques; Heuristics; Dynamic trees; Branch-and-bound
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/56—Provisioning of proxy services
- H04L67/565—Conversion or adaptation of application format or content
- H04L67/5651—Reducing the amount or size of exchanged application data
Definitions
- a merchant acquirer also known as a processor or a payment gateways.
- Acquirers act as middlemen between the merchants, the merchant's bank, payment networks, and/or the consumer's bank for a purchase of a good or service using a payment card. While some acquirers are very large, most acquirers are relative small and may have a specific focus, for example, a product-type or a geographic region. An acquirer's business may depend on achieving a correct balance of merchants to maximize profit and reduce risk. However, the computer tools available for acquirers to view and analyze risk are often lacking because of the limits on data access.
- an acquirer tool has increased leverage for data acquisition and analysis.
- This increased leverage allows machine learning (ML) algorithms to analyze high volumes of data in view of the acquirer's characteristics including current risk and fraud ratios, geographic coverage, business types, and non-aligned merchants.
- the ML algorithms may first evaluate the acquirer's current portfolio to determine a baseline of volume, fraud, and chargebacks. The ML algorithms then begin a process of identifying model business categories that would improve the acquirer's portfolio with respect to the value, volume, fraud, and chargebacks statistics. Finally, the ML algorithm may match the model businesses to actual business with which the acquirer does not currently have a relationship.
- the process may include presenting a graphical interface detailing the ML algorithm's results and feeding the acquirer's comments back into the ML algorithm to further train the ML engine 166 to more accurately reflect the user's perception of ideal.
- the engine 166 may have separate training weights to reach similar but perhaps slightly different goals based on an acquirer's historical preferences, risk aversion, etc.
- the acquirer tool may be a stand-alone application accessed by an acquirer or may be integrated into an existing customer relationship management (CRM) tool via an application program interface (API).
- the acquirer tool may be operated by a payment network, allowing data from a wide variety of businesses to be included in the recommendation process.
- FIG. 1 is a block diagram of an environment supporting intelligent portfolio diversification in accordance with the current disclosure
- FIG. 2 is a block diagram illustrating components of an intelligent portfolio diversification tool
- FIG. 3 is a block diagram of machine learning (ML) and artificial intelligence (AI) engines
- FIG. 4 is block diagram illustrating an embodiment of ML and AI engines in accordance with the current disclosure
- FIG. 5 is block diagram illustrating an alternate embodiment of ML and AI engines in accordance with the current disclosure
- FIG. 6 is a flowchart of a method of generating a model portfolio using an intelligent diversification tool
- FIG. 7 illustrates a user interface of showing a tabular view of a portfolio analysis
- FIG. 8 illustrates a user interface showing a graphical view of a portfolio analysis
- FIG. 9 illustrates an exemplary user interface showing a tabular view of a model portfolio
- FIG. 10 illustrates an exemplary user interface showing recommended merchants by category.
- a system may perform an analysis of a first dataset and may return a target dataset using an AI/ML engine to optimize for selected factors.
- the target dataset may be generated by supplementing the first dataset with additional elements to balance or offset outlier data elements of the first dataset.
- the first dataset may be a collection of merchants associated with a merchant acquirer or acquirer. For the purpose of this disclosure, no distinction is made between acquiring transactions for an online merchant and a brick and mortar merchant.
- FIG. 1 illustrates an environment 10 for operating the intelligent diversification tool (IDT) 100 .
- An acquirer 20 may be connected to a first group of merchants 30 for which the acquirer 20 processes transactions.
- the acquirer 20 may receive transaction information from the merchant 30 , communicate with an appropriate issuer 40 to authorize and then later clear the transaction.
- This data may be stored into one or more databases 60 .
- the databases 60 may capture transaction information for other merchants 50 who use a different acquirer 70 .
- the databases 60 may allow each acquirer 20 , 70 to add and view data associated with their respective merchants 30 , 50 .
- data from the databases 60 from both acquirers 20 , 70 may be viewable by the IDT 100 .
- Either acquirer 20 , 70 may be able to access the IDT 100 as described in more detail below.
- transaction data from both acquirers 20 , 70 may be used for training the machine learning engine, also discussed more below.
- the acquirers 20 , 70 represent a real world field of hundreds or more acquirers that may benefit from use of the IDT 100 .
- the IDT 100 may include various processors or modules associated with particular functions of the IDT 100 .
- purpose built physical equipment may be part of the system.
- software may be used to physically configure one or more processors, which may be local or may be remote such as in a cloud of remote computing devices which may be accessed over a network communication link.
- Databases 102 , 104 and 106 may be associated with the FIG. 1 databases 60 .
- the databases 102 , 104 , 106 may be a single database, may be a distributed database, may be cloud instances of data storage facilities, or other physical configurations of databases.
- the database 60 may be a single data schema and the individual data represented by databases 102 , 104 and 106 may simply be queries on the overall database 60 .
- the IDT may include an application program interface (API) 120 that allows programmatic communication between the IDT 100 and one or more acquirers 20 .
- the API 120 may expose methods available to the acquirer 20 , for example, to request an as-is presentation 110 discussed below or to initiate an analysis process.
- the API 120 may also be implemented using a Representational State Transfer or “REST” interface.
- the API 120 may require authentication so that access to transaction data may be limited to those to whom the data belongs or to those to which access has been granted.
- the API 120 may expect known commands in known formats and may respond with a predetermined response in a predetermined format. The response may follow a predetermined data structure such as certain bits being dedicated to providing predetermined information. As a result, communication may be efficient and reliable as the data into and out of the API 120 may in known formats and with expected results.
- a user interface 121 may be supported for direct access to the IDT 100 .
- the user interface 121 may host a web presence that can be accessed via an intranet or an external network such as the Internet.
- authentication may be required when accessing the IDT 100 via the user interface 121 .
- the IDT 100 may include an as-is analysis processor 108 that may collect data from a merchant transaction database 102 .
- the merchant transaction database 102 may include all transactions processed by the acquirer 20 .
- the as-is analysis processor 108 may activate responsive to an event requesting activation of the IDT 100 .
- the processor 108 may request data over a given date range or may use a predetermined range such as the previous one year.
- an acquirer 20 may set a date range that corresponds to a current portfolio of merchants 30 so that the results of the as-is analysis may more drive a more accurate recommendation from an ML/AI engine 114 .
- a window 352 may contain the table 354 illustrating a summary of transactions for the acquirer XYZ Financial.
- the table 354 may show industry/market segments representing merchant categories. The merchant categories may be based on the Merchant Category Code (MCC) as assigned by the individual merchant's bank.
- MCC Merchant Category Code
- the table 354 may show transaction value and transaction count as a way for the acquirer to quickly compare volumes vs. values.
- the fraud rate may illustrate how many of the transactions were later disputed, for example, as having been associated with a stolen credit instrument.
- the chargeback rate may indicate a rate at which the transactions are reversed, such as by disputed transactions for which the retailer will not honor a refund.
- the table 354 may provide the acquirer an idea of where and how their transaction values and risks are allocated among their current clients.
- a button 356 may allow the acquirer to execute the intelligent diversification tool (IDT) 100 , as discussed more below.
- IDT intelligent diversification tool
- FIG. 8 may illustrate a graphical view 360 of a window 362 illustrating of one value of transaction data, in this case, fraud rate.
- the length of the bars and corresponding size of the boxes in the graphics area 364 may illustrate the comparative values for each of the categories.
- Other transaction data may be illustrated graphically, or combinations may be developed such as double bars for each category illustrating fraud rate and total transaction value.
- a start button 366 may allow a user to begin execution of the IDT recommendation process.
- the results from the as-is analysis processor 108 may be passed to a machine learning artificial intelligence (ML/AI) engine 114 .
- ML/AI machine learning artificial intelligence
- the data processing associated with the ML/AI engine 114 is discussed in more detail below, but in general, the engine 114 gathers additional data from a market database 104 of broad transaction statistics, that is, transactions beyond those available to the acquirer 20 . Further, the engine 114 may optionally use demographic statistics about the current acquirer 20 to further inform recommendations, such as limiting selections to a particular geographic region where acquirer currently operates.
- the ML/AI engine 114 may generate a recommended portfolio by MCC classification, illustrating how the current portfolio may be restructured or supplemented to improve risk factors including fraud and chargebacks. However, because in some cases, higher risk merchants may pay a higher rate for transaction processing, there may be situations where some portfolios are so conservative that the engine 114 may recommend the addition of higher risk categories to improve the overall profitability of the acquirer.
- FIG. 9 may illustrate a tabular view 380 of a window 382 illustrating a recommended portfolio 384 .
- the recommended portfolio 384 may include both new classifications and recommended volume breakdowns among categories.
- the recommended portfolio 384 may retain the current volume and value levels of the original portfolio but may reduce or reallocate the total percentage of high risk categories by increasing the volume and/or value of other categories.
- a category may selected and a figure of merit, in this case, percentage of total volume may be increased or decreased so that another mix of values may be generated.
- a return button 386 may provide one avenue of leaving the tabular view screen. In other embodiments, printing to paper or conversion to a document format may also be provided.
- the ML/AI engine 166 may also provide a tabular view 390 with a window 392 showing actual merchant names 394 from within the target categories generated in the initial recommendation shown in FIG. 9 .
- the merchant names 394 may be screened to exclude those merchants which that are already affiliated with a payment processor or network supplying the market database 104 to avoid cannibalization of merchants already in a particular payment ecosystem.
- Other views of the merchant recommendations may be supported. For example, a map-based view of location of the particular merchants may be presented in the review.
- the return button 396 may allow a user to return to a previous page.
- the changes entered at the portfolio display tool 116 may be recorded via the selection analysis tool 118 and fed back to the ML/AI engine 114 to update the hidden layer values of the engine 114 to provide a more robust recommendation in future analysis activities.
- FIG. 3 is a simplified and representative diagram of a processor-based ML/AI engine 114 .
- the engine 114 may include a processor 162 and memory 164 coupled by a data bus.
- the engine 114 functions may be split between an ML engine 166 and an AI engine 166 .
- the engine 114 may be remote or may be local or may be a combination of local and remote.
- FIG. 4 illustrates one architecture for configuring the ML engine 166 and AI engine 168 .
- An input layer 170 may receive both controllable and non-controllable inputs.
- a non-controllable input may include those data that are observed and not subject to change. In this case, the current portfolio of the acquirer 20 may be included in the non-controllable inputs.
- geographic region restrictions may also be included as non-controllable inputs. However, in some case, changes to the geographic region may be allowed as controllable inputs to broaden the scope of recommendations.
- the controllable inputs may include proposed categories and their corresponding statistics as discussed more below.
- the ML engine 166 may have additional nodes in each layer.
- the input layer 170 may expect the inputs in a given format or data structure or the input layer 170 may be able to parse the data into a format it can use.
- the collective inputs may drive a hidden layer in the ML engine 166 that has nodes which weight each input in a comparative manner to drive an output layer 174 used to formulate an output 176 .
- a learning process is used to weight the hidden layer values to provide acceptable outputs for a wide variety of input conditions.
- the training process may include thousands of samples that may be evaluated by a human observer to grade the quality of the result.
- the AI engine 168 may receive data from the databases 60 to formulate new proposals for ML engine 166 to process into ideal portfolio mixes.
- the hidden layer 172 may provide feedback to the AI engine 168 while in other cases, the output layer may also provide feedback to the AI engine 168 .
- the AI engine 168 may evaluate the available candidates for selection based on characteristics of the acquirer, for example, regional preferences. That is, the field of merchant categories available to a very large processor may not be available to a smaller, regional processor. Therefore, the controllable inputs to the system may need to be selected based on heuristics associated with the acquirer 20 . As shown in FIG. 3 , selections made by evaluators at a selection process 118 may be provided for on-going training of the ML engine 166 .
- ML engine 166 and AI engine 168 may be built.
- a second instance of an ML engine or an additional layer may be used to evaluate the predicted results from the observed inputs 170 in order to generate suggested offers to the AI engine 168 .
- FIG. 5 One such embodiment is shown in FIG. 5 .
- a second output layer with outputs 178 may be used to generate category recommendations to the AI engine 168 , which in turn, generates updated idealized portfolios.
- FIG. 6 is a flowchart of a method 300 of utilizing an ML/AI engine 166 to process analytical data associated with transaction processing.
- an ML/AI engine 166 may be trained to provide ideal portfolio recommendations. The training may involve seeding the engine 166 with initial portfolios, that is, non-optimized portfolios and then critiquing the resulting recommendation, often as simply as agreeing or disagreeing with the recommendation. In this way the engine 166 learns what a good portfolio looks like and may learn how to select from available categories to develop an optimized portfolio having improved value and risk characteristics.
- a request may be received from an acquirer via an application program interface (API) 120 that supports, for example, a REST data access protocol.
- the request may initiate a process at the IDT 100 for an analysis of the acquirer's portfolio.
- the request may also include a range of dates over which to acquire data.
- the IDT 100 may use all available data for the acquirer's current set of merchants. That is, the IDT 100 may gather transaction data using the acquirer's current portfolio and gather historical data back to a point when the mix of acquirer accounts changes. This may help ensure that the maximum amount of data is used for the analysis while avoiding tainting the data with merchant transactions that are no longer part of the acquirer's portfolio.
- the transaction history for the acquirer's current accounts may be received from the merchant transaction database 102 at block 304 .
- the data resulting from this query response may include longitudinal data for a transaction including not only the date and value of the transaction but also whether it was disputed, refunded, or identified as fraudulent.
- the data may be characterized at block 306 to extract from the individual transactions relevant values and also to categorize the merchants according to a predetermined code scheme.
- the coding may use the well-known merchant classification code (MCC) that allows various merchants to be classified by their type of business such as retail, gambling, food, fuel, etc. Each merchant is generally assigned an MCC classification when the merchant initiates payment processing with its bank. Logically, other classification schemes are possible and are contemplated.
- MCC merchant classification code
- Execution may continue at block 310 whether the characterization data is provided to the acquirer 20 or not.
- the data from the characterization may be applied to the non-controllable inputs of the ML engine 166 , initiating the recommendation processing by the IDT 100 .
- the recommendation processing may include limiting certain of the input data received from the market database in view of demographic limitations associated with the acquirer including but not limited to geographic restrictions or merchant-type preferences such as non-tobacco.
- a recommended portfolio may be assessed to determine if it meets a minimum criteria, for example, for fraud level as a percentage of total transaction value. If not, an output of the ML engine 166 may be fed to the AI engine 168 to change one or more controllable inputs. For example, a geographic restriction may be eased, or categories not previously included may be added to help improve the overall recommendation.
- various predictors may be used. Some may include merchant-specific factors including but not limited to, merchant/client identifier, merchant/client location, merchant category code, merchant market segment, point of sale entry mode, ecommerce indicator, card present/not present, or enhanced merchant attributes. Some factors may be acquirer-specific, such as, acquirer business identifier, acquirer bank identification number (BIN), acquirer portfolio, transaction volume, transaction count, fraud volume rate, fraud count rate, charge back volume rate, or chargeback count rate. Heuristically generated indicators may also be used, such as, predictive payment volume and growth or anomaly avoidance (outlier fraud).
- merchant-specific factors including but not limited to, merchant/client identifier, merchant/client location, merchant category code, merchant market segment, point of sale entry mode, ecommerce indicator, card present/not present, or enhanced merchant attributes. Some factors may be acquirer-specific, such as, acquirer business identifier, acquirer bank identification number (BIN), acquirer portfolio, transaction volume, transaction count, fraud volume rate, fraud count rate, charge back volume rate,
- any of several options may be implemented or selected to drive the overall process.
- cluster analysis or decision trees may guide the selection process.
- a simple average may be used while in other embodiments a recommender system based on either collaborative filtering or content-based filtering.
- feedback from the final selection process may be used to update attribute values used in the selection process.
- a multi-criteria recommender or multi-criteria decision tree may be implemented to provide the recommendations.
- the ML engine 166 may provide an output 176 via the API 120 to the acquirer 20 categorized using the same classification system used for the input data, in the exemplary case, using MCC classifications.
- the output may be formatted for graphic display, such as an XML-formatted data file.
- FIG. 9 One illustrative example of displaying the results is shown in FIG. 9 .
- the output may be adjusted and customized by a user to provide the output in a format that is useful to the user. For example, in some embodiments, a human authority may review the output. In other embodiments, another computer application may use the output and the expansive graphics may not be necessary.
- a determination may be whether to provide specific merchant suggestions. The determination may be based on a prior selection made at the beginning of the process. In another embodiment, the determination may be based on status of a subscription to such a service. If specific merchants are to be provided as part of the portfolio recommendation, execution may continue at block 320 . Block 320 may generate the specific merchants, for example, as illustrated in FIG. 10 .
- the output information may include specific merchant suggestions that a chief risk officer or business development manager can use for creating a plan to change the acquirer's merchant base to a lower risk and/or higher reward mix. For example, if a category is suggested for improving an acquirer portfolio with a given target value, such as 8% of volume, the AI engine may select one or more merchants from that category that can provide that target value. As discussed above, the merchants may be selected to include only those that are not already served by the ecosystem associated with the IDT 100 . The selection may be made automatically using an algorithm or may be made in response to user input in a user interface designed to receive guidance.
- a reviewer at the acquirer 20 may provide feedback on the results generated by the IDT 100 .
- a user interface may be designed and used to make the providing of feedback simple and straightforward. Either path from block 314 ultimately leads to block 316 , where the ML/AI tool 166 may gather that feedback from any selections made at block 312 or 320 from the acquirer about the recommended portfolio or the specific merchants. This feedback may be used to update the ML engine 166 to provide more accurate recommendations in the future. This retraining process may be applied globally to all uses of the ML engine 166 or may be limited to the specific acquirer providing the feedback.
- One technical effect of the system is an improved data access mechanism tying the acquirer and multiple databases to the intelligent diversification tool 100 . That is, the API 120 improves access for the acquirer 20 to both its own data, illustrated by the generation of the as-is information but also provides valuable access to a market-wide database 104 that was previously unavailable.
- the use of the ML engine 166 coupled to the AI engine 168 solves a technological problem of placing constraints on input data for a machine learning tool trained to provide one result. That is, unlike a typical ML implementation where inputs are provided and an output is generated, the AI engine 168 may operate on the available market data in view of acquirer 20 demographics and preferences to limit the available output to meet those demographic and preference requirements.
- a system and method in accordance with the current disclosure benefits acquirers by providing access to data from a base of information previously not available to any single acquirer.
- the suggested portfolio may be based not only on the acquirers current portfolio of merchants but may also be based on demographic preferences including geographic region.
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Human Resources & Organizations (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- Strategic Management (AREA)
- Entrepreneurship & Innovation (AREA)
- Economics (AREA)
- General Physics & Mathematics (AREA)
- Educational Administration (AREA)
- Quality & Reliability (AREA)
- Tourism & Hospitality (AREA)
- Operations Research (AREA)
- General Business, Economics & Management (AREA)
- Marketing (AREA)
- Development Economics (AREA)
- Game Theory and Decision Science (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Mathematical Physics (AREA)
- Data Mining & Analysis (AREA)
- Databases & Information Systems (AREA)
- Evolutionary Computation (AREA)
- Computing Systems (AREA)
- Artificial Intelligence (AREA)
- Fuzzy Systems (AREA)
- Computational Linguistics (AREA)
- Probability & Statistics with Applications (AREA)
- Algebra (AREA)
- Computational Mathematics (AREA)
- Mathematical Analysis (AREA)
- Mathematical Optimization (AREA)
- Pure & Applied Mathematics (AREA)
- Computer Vision & Pattern Recognition (AREA)
- Medical Informatics (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
Description
- The background description provided herein is for the purpose of generally presenting the context of the disclosure. Work of the presently named inventors, to the extent it is described in this background section, as well as aspects of the description that may not otherwise qualify as prior art at the time of filing, are neither expressly nor impliedly admitted as prior art against the present disclosure.
- The process of receiving payment information from a merchant or online vendor is handled by a merchant acquirer (“acquirer”) also known as a processor or a payment gateways. Acquirers act as middlemen between the merchants, the merchant's bank, payment networks, and/or the consumer's bank for a purchase of a good or service using a payment card. While some acquirers are very large, most acquirers are relative small and may have a specific focus, for example, a product-type or a geographic region. An acquirer's business may depend on achieving a correct balance of merchants to maximize profit and reduce risk. However, the computer tools available for acquirers to view and analyze risk are often lacking because of the limits on data access.
- In an embodiment, an acquirer tool has increased leverage for data acquisition and analysis. This increased leverage allows machine learning (ML) algorithms to analyze high volumes of data in view of the acquirer's characteristics including current risk and fraud ratios, geographic coverage, business types, and non-aligned merchants. The ML algorithms may first evaluate the acquirer's current portfolio to determine a baseline of volume, fraud, and chargebacks. The ML algorithms then begin a process of identifying model business categories that would improve the acquirer's portfolio with respect to the value, volume, fraud, and chargebacks statistics. Finally, the ML algorithm may match the model businesses to actual business with which the acquirer does not currently have a relationship. The process may include presenting a graphical interface detailing the ML algorithm's results and feeding the acquirer's comments back into the ML algorithm to further train the
ML engine 166 to more accurately reflect the user's perception of ideal. In some embodiments, theengine 166 may have separate training weights to reach similar but perhaps slightly different goals based on an acquirer's historical preferences, risk aversion, etc. - The acquirer tool may be a stand-alone application accessed by an acquirer or may be integrated into an existing customer relationship management (CRM) tool via an application program interface (API). In an embodiment, the acquirer tool may be operated by a payment network, allowing data from a wide variety of businesses to be included in the recommendation process.
- The figures depict a preferred embodiment for purposes of illustration only. One skilled in the art may readily recognize from the following discussion that alternative embodiments of the structures and methods illustrated herein may be employed without departing from the principles described herein.
-
FIG. 1 is a block diagram of an environment supporting intelligent portfolio diversification in accordance with the current disclosure; -
FIG. 2 is a block diagram illustrating components of an intelligent portfolio diversification tool; -
FIG. 3 is a block diagram of machine learning (ML) and artificial intelligence (AI) engines; -
FIG. 4 is block diagram illustrating an embodiment of ML and AI engines in accordance with the current disclosure; -
FIG. 5 is block diagram illustrating an alternate embodiment of ML and AI engines in accordance with the current disclosure; -
FIG. 6 is a flowchart of a method of generating a model portfolio using an intelligent diversification tool; -
FIG. 7 illustrates a user interface of showing a tabular view of a portfolio analysis; -
FIG. 8 illustrates a user interface showing a graphical view of a portfolio analysis; -
FIG. 9 illustrates an exemplary user interface showing a tabular view of a model portfolio; and -
FIG. 10 illustrates an exemplary user interface showing recommended merchants by category. - At a high level, a system may perform an analysis of a first dataset and may return a target dataset using an AI/ML engine to optimize for selected factors. The target dataset may be generated by supplementing the first dataset with additional elements to balance or offset outlier data elements of the first dataset. In an embodiment, the first dataset may be a collection of merchants associated with a merchant acquirer or acquirer. For the purpose of this disclosure, no distinction is made between acquiring transactions for an online merchant and a brick and mortar merchant.
-
FIG. 1 illustrates anenvironment 10 for operating the intelligent diversification tool (IDT) 100. Anacquirer 20 may be connected to a first group ofmerchants 30 for which the acquirer 20 processes transactions. During a transaction, theacquirer 20 may receive transaction information from themerchant 30, communicate with anappropriate issuer 40 to authorize and then later clear the transaction. This data may be stored into one ormore databases 60. As more information about the transaction becomes available, such as the time to settle, identification of the transaction as fraudulent, or reversing the transaction, such as a reversal caused by a return of the purchased item. In this exemplary illustration, thedatabases 60 may capture transaction information forother merchants 50 who use a different acquirer 70. Thedatabases 60 may allow eachacquirer respective merchants databases 60 from bothacquirers acquirers acquirers - Turning to
FIG. 2 , a block diagram of components in and associated with an intelligent diversification tool (IDT) 100 may be illustrated. The IDT 100 may include various processors or modules associated with particular functions of the IDT 100. In some embodiments, purpose built physical equipment may be part of the system. In other embodiments, software may be used to physically configure one or more processors, which may be local or may be remote such as in a cloud of remote computing devices which may be accessed over a network communication link. -
Databases FIG. 1 databases 60. In various embodiments, thedatabases database 60 may be a single data schema and the individual data represented bydatabases overall database 60. - The IDT may include an application program interface (API) 120 that allows programmatic communication between the IDT 100 and one or
more acquirers 20. TheAPI 120 may expose methods available to theacquirer 20, for example, to request an as-is presentation 110 discussed below or to initiate an analysis process. The API 120 may also be implemented using a Representational State Transfer or “REST” interface. TheAPI 120 may require authentication so that access to transaction data may be limited to those to whom the data belongs or to those to which access has been granted. In use, theAPI 120 may expect known commands in known formats and may respond with a predetermined response in a predetermined format. The response may follow a predetermined data structure such as certain bits being dedicated to providing predetermined information. As a result, communication may be efficient and reliable as the data into and out of theAPI 120 may in known formats and with expected results. - In addition to or instead of the
API 120, auser interface 121 may be supported for direct access to the IDT 100. For example, theuser interface 121 may host a web presence that can be accessed via an intranet or an external network such as the Internet. As with theAPI 120, authentication may be required when accessing the IDT 100 via theuser interface 121. - In the illustrated exemplary embodiment, the IDT 100 may include an as-
is analysis processor 108 that may collect data from amerchant transaction database 102. Themerchant transaction database 102 may include all transactions processed by theacquirer 20. - The as-is
analysis processor 108 may activate responsive to an event requesting activation of theIDT 100. Theprocessor 108 may request data over a given date range or may use a predetermined range such as the previous one year. In an embodiment, anacquirer 20 may set a date range that corresponds to a current portfolio ofmerchants 30 so that the results of the as-is analysis may more drive a more accurate recommendation from an ML/AI engine 114. - Optionally, the output of the as-is
analysis processor 108 may drive apresentation generator 110 that generates tabular or graphical output according to one or more data templates. Turning briefly toFIG. 7 , an exemplarytabular display 350 generated by thepresentation generator 110 may be illustrated. Awindow 352 may contain the table 354 illustrating a summary of transactions for the acquirer XYZ Financial. The table 354 may show industry/market segments representing merchant categories. The merchant categories may be based on the Merchant Category Code (MCC) as assigned by the individual merchant's bank. The table 354 may show transaction value and transaction count as a way for the acquirer to quickly compare volumes vs. values. The fraud rate may illustrate how many of the transactions were later disputed, for example, as having been associated with a stolen credit instrument. The chargeback rate may indicate a rate at which the transactions are reversed, such as by disputed transactions for which the retailer will not honor a refund. Overall, the table 354 may provide the acquirer an idea of where and how their transaction values and risks are allocated among their current clients. - A
button 356 may allow the acquirer to execute the intelligent diversification tool (IDT) 100, as discussed more below. -
FIG. 8 may illustrate agraphical view 360 of awindow 362 illustrating of one value of transaction data, in this case, fraud rate. The length of the bars and corresponding size of the boxes in thegraphics area 364 may illustrate the comparative values for each of the categories. Other transaction data may be illustrated graphically, or combinations may be developed such as double bars for each category illustrating fraud rate and total transaction value. In an embodiment, a user may select a preferred output style according to a menu selection (not depicted). Astart button 366 may allow a user to begin execution of the IDT recommendation process. - Returning to
FIG. 2 , whether or not theacquirer 20 views a tabular or graphical presentation of the current state, the results from the as-isanalysis processor 108 may be passed to a machine learning artificial intelligence (ML/AI)engine 114. The data processing associated with the ML/AI engine 114 is discussed in more detail below, but in general, theengine 114 gathers additional data from amarket database 104 of broad transaction statistics, that is, transactions beyond those available to theacquirer 20. Further, theengine 114 may optionally use demographic statistics about thecurrent acquirer 20 to further inform recommendations, such as limiting selections to a particular geographic region where acquirer currently operates. - The ML/
AI engine 114 may generate a recommended portfolio by MCC classification, illustrating how the current portfolio may be restructured or supplemented to improve risk factors including fraud and chargebacks. However, because in some cases, higher risk merchants may pay a higher rate for transaction processing, there may be situations where some portfolios are so conservative that theengine 114 may recommend the addition of higher risk categories to improve the overall profitability of the acquirer. - The output of the
engine 114 may be illustrated in graphical or tabular form for review by theacquirer 20. For example,FIG. 9 may illustrate atabular view 380 of awindow 382 illustrating a recommendedportfolio 384. The recommendedportfolio 384 may include both new classifications and recommended volume breakdowns among categories. In an embodiment, the recommendedportfolio 384 may retain the current volume and value levels of the original portfolio but may reduce or reallocate the total percentage of high risk categories by increasing the volume and/or value of other categories. In the illustrated embodiment, a category may selected and a figure of merit, in this case, percentage of total volume may be increased or decreased so that another mix of values may be generated. Areturn button 386 may provide one avenue of leaving the tabular view screen. In other embodiments, printing to paper or conversion to a document format may also be provided. - In one embodiment illustrated in
FIG. 10 , the ML/AI engine 166 may also provide atabular view 390 with awindow 392 showingactual merchant names 394 from within the target categories generated in the initial recommendation shown inFIG. 9 . The merchant names 394 may be screened to exclude those merchants which that are already affiliated with a payment processor or network supplying themarket database 104 to avoid cannibalization of merchants already in a particular payment ecosystem. Other views of the merchant recommendations may be supported. For example, a map-based view of location of the particular merchants may be presented in the review. Thereturn button 396 may allow a user to return to a previous page. - Returning again to
FIG. 2 , the changes entered at theportfolio display tool 116 may be recorded via theselection analysis tool 118 and fed back to the ML/AI engine 114 to update the hidden layer values of theengine 114 to provide a more robust recommendation in future analysis activities. - The training and updating of the
engine 114 is discussed in more detail inFIGS. 3-5 .FIG. 3 is a simplified and representative diagram of a processor-based ML/AI engine 114. Theengine 114 may include aprocessor 162 andmemory 164 coupled by a data bus. Theengine 114 functions may be split between anML engine 166 and anAI engine 166. Similarly, as mentioned previously, theengine 114 may be remote or may be local or may be a combination of local and remote. -
FIG. 4 illustrates one architecture for configuring theML engine 166 andAI engine 168. Aninput layer 170 may receive both controllable and non-controllable inputs. A non-controllable input may include those data that are observed and not subject to change. In this case, the current portfolio of theacquirer 20 may be included in the non-controllable inputs. In some cases, geographic region restrictions may also be included as non-controllable inputs. However, in some case, changes to the geographic region may be allowed as controllable inputs to broaden the scope of recommendations. The controllable inputs may include proposed categories and their corresponding statistics as discussed more below. In practice, theML engine 166 may have additional nodes in each layer. Theinput layer 170 may expect the inputs in a given format or data structure or theinput layer 170 may be able to parse the data into a format it can use. - The collective inputs may drive a hidden layer in the
ML engine 166 that has nodes which weight each input in a comparative manner to drive anoutput layer 174 used to formulate anoutput 176. A learning process is used to weight the hidden layer values to provide acceptable outputs for a wide variety of input conditions. The training process may include thousands of samples that may be evaluated by a human observer to grade the quality of the result. - The
AI engine 168 may receive data from thedatabases 60 to formulate new proposals forML engine 166 to process into ideal portfolio mixes. In some cases, the hiddenlayer 172 may provide feedback to theAI engine 168 while in other cases, the output layer may also provide feedback to theAI engine 168. TheAI engine 168 may evaluate the available candidates for selection based on characteristics of the acquirer, for example, regional preferences. That is, the field of merchant categories available to a very large processor may not be available to a smaller, regional processor. Therefore, the controllable inputs to the system may need to be selected based on heuristics associated with theacquirer 20. As shown inFIG. 3 , selections made by evaluators at aselection process 118 may be provided for on-going training of theML engine 166. - Other configurations of
ML engine 166 andAI engine 168 may be built. For example, a second instance of an ML engine or an additional layer may be used to evaluate the predicted results from the observedinputs 170 in order to generate suggested offers to theAI engine 168. One such embodiment is shown inFIG. 5 . As illustrated, a second output layer withoutputs 178 may be used to generate category recommendations to theAI engine 168, which in turn, generates updated idealized portfolios. -
FIG. 6 is a flowchart of amethod 300 of utilizing an ML/AI engine 166 to process analytical data associated with transaction processing. In an embodiment, an ML/AI engine 166 may be trained to provide ideal portfolio recommendations. The training may involve seeding theengine 166 with initial portfolios, that is, non-optimized portfolios and then critiquing the resulting recommendation, often as simply as agreeing or disagreeing with the recommendation. In this way theengine 166 learns what a good portfolio looks like and may learn how to select from available categories to develop an optimized portfolio having improved value and risk characteristics. - At
block 302, a request may be received from an acquirer via an application program interface (API) 120 that supports, for example, a REST data access protocol. The request may initiate a process at theIDT 100 for an analysis of the acquirer's portfolio. The request may also include a range of dates over which to acquire data. In an embodiment, theIDT 100 may use all available data for the acquirer's current set of merchants. That is, theIDT 100 may gather transaction data using the acquirer's current portfolio and gather historical data back to a point when the mix of acquirer accounts changes. This may help ensure that the maximum amount of data is used for the analysis while avoiding tainting the data with merchant transactions that are no longer part of the acquirer's portfolio. - The transaction history for the acquirer's current accounts may be received from the
merchant transaction database 102 atblock 304. The data resulting from this query response may include longitudinal data for a transaction including not only the date and value of the transaction but also whether it was disputed, refunded, or identified as fraudulent. - The data may be characterized at
block 306 to extract from the individual transactions relevant values and also to categorize the merchants according to a predetermined code scheme. In one embodiment, the coding may use the well-known merchant classification code (MCC) that allows various merchants to be classified by their type of business such as retail, gambling, food, fuel, etc. Each merchant is generally assigned an MCC classification when the merchant initiates payment processing with its bank. Logically, other classification schemes are possible and are contemplated. - After the merchant transaction data is characterized, a determination may be made at
block 308 to provide the characterization data to the requestingacquirer 20. If so, the characterized data may, atblock 318, be formatted and provided or made available to theacquirer 20 via theAPI 120 for display at an acquirer system (not depicted). In various embodiments, the displayed data may be in tabular form as shown inFIG. 7 or may be shown in graphical form as illustrated inFIG. 8 . - Execution may continue at
block 310 whether the characterization data is provided to theacquirer 20 or not. The data from the characterization may be applied to the non-controllable inputs of theML engine 166, initiating the recommendation processing by theIDT 100. As discussed above, the recommendation processing may include limiting certain of the input data received from the market database in view of demographic limitations associated with the acquirer including but not limited to geographic restrictions or merchant-type preferences such as non-tobacco. In an embodiment, a recommended portfolio may be assessed to determine if it meets a minimum criteria, for example, for fraud level as a percentage of total transaction value. If not, an output of theML engine 166 may be fed to theAI engine 168 to change one or more controllable inputs. For example, a geographic restriction may be eased, or categories not previously included may be added to help improve the overall recommendation. - In the course of generating the recommended portfolio, various predictors may be used. Some may include merchant-specific factors including but not limited to, merchant/client identifier, merchant/client location, merchant category code, merchant market segment, point of sale entry mode, ecommerce indicator, card present/not present, or enhanced merchant attributes. Some factors may be acquirer-specific, such as, acquirer business identifier, acquirer bank identification number (BIN), acquirer portfolio, transaction volume, transaction count, fraud volume rate, fraud count rate, charge back volume rate, or chargeback count rate. Heuristically generated indicators may also be used, such as, predictive payment volume and growth or anomaly avoidance (outlier fraud).
- In generating the recommended portfolio, any of several options may be implemented or selected to drive the overall process. For example, cluster analysis or decision trees may guide the selection process. In other embodiments, a simple average may be used while in other embodiments a recommender system based on either collaborative filtering or content-based filtering. For example, feedback from the final selection process may be used to update attribute values used in the selection process. In more complex embodiments, a multi-criteria recommender or multi-criteria decision tree may be implemented to provide the recommendations.
- After processing, with or without optimization, at
block 312 theML engine 166 may provide anoutput 176 via theAPI 120 to theacquirer 20 categorized using the same classification system used for the input data, in the exemplary case, using MCC classifications. The output may be formatted for graphic display, such as an XML-formatted data file. One illustrative example of displaying the results is shown inFIG. 9 . The output may be adjusted and customized by a user to provide the output in a format that is useful to the user. For example, in some embodiments, a human authority may review the output. In other embodiments, another computer application may use the output and the expansive graphics may not be necessary. - At
block 314, a determination may be whether to provide specific merchant suggestions. The determination may be based on a prior selection made at the beginning of the process. In another embodiment, the determination may be based on status of a subscription to such a service. If specific merchants are to be provided as part of the portfolio recommendation, execution may continue atblock 320.Block 320 may generate the specific merchants, for example, as illustrated inFIG. 10 . - In some cases, the output information may include specific merchant suggestions that a chief risk officer or business development manager can use for creating a plan to change the acquirer's merchant base to a lower risk and/or higher reward mix. For example, if a category is suggested for improving an acquirer portfolio with a given target value, such as 8% of volume, the AI engine may select one or more merchants from that category that can provide that target value. As discussed above, the merchants may be selected to include only those that are not already served by the ecosystem associated with the
IDT 100. The selection may be made automatically using an algorithm or may be made in response to user input in a user interface designed to receive guidance. - In an embodiment, a reviewer at the
acquirer 20 may provide feedback on the results generated by theIDT 100. A user interface may be designed and used to make the providing of feedback simple and straightforward. Either path fromblock 314 ultimately leads to block 316, where the ML/AI tool 166 may gather that feedback from any selections made atblock ML engine 166 to provide more accurate recommendations in the future. This retraining process may be applied globally to all uses of theML engine 166 or may be limited to the specific acquirer providing the feedback. - One technical effect of the system is an improved data access mechanism tying the acquirer and multiple databases to the
intelligent diversification tool 100. That is, theAPI 120 improves access for theacquirer 20 to both its own data, illustrated by the generation of the as-is information but also provides valuable access to a market-wide database 104 that was previously unavailable. In addition, the use of theML engine 166 coupled to theAI engine 168 solves a technological problem of placing constraints on input data for a machine learning tool trained to provide one result. That is, unlike a typical ML implementation where inputs are provided and an output is generated, theAI engine 168 may operate on the available market data in view ofacquirer 20 demographics and preferences to limit the available output to meet those demographic and preference requirements. - A system and method in accordance with the current disclosure benefits acquirers by providing access to data from a base of information previously not available to any single acquirer. The suggested portfolio may be based not only on the acquirers current portfolio of merchants but may also be based on demographic preferences including geographic region.
- The figures depict preferred embodiments for purposes of illustration only. One skilled in the art will readily recognize from the following discussion that alternative embodiments of the structures and methods illustrated herein may be employed without departing from the principles described herein
- Upon reading this disclosure, those of skill in the art will appreciate still additional alternative structural and functional designs for the systems and methods described herein through the disclosed principles herein. Thus, while particular embodiments and applications have been illustrated and described, it is to be understood that the disclosed embodiments are not limited to the precise construction and components disclosed herein. Various modifications, changes and variations, which will be apparent to those skilled in the art, may be made in the arrangement, operation and details of the systems and methods disclosed herein without departing from the spirit and scope defined in any appended claims.
Claims (20)
Priority Applications (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US15/991,073 US11080639B2 (en) | 2018-05-29 | 2018-05-29 | Intelligent diversification tool |
PCT/US2019/035337 WO2019232551A1 (en) | 2018-05-29 | 2019-06-04 | Intelligent diversification tool |
US17/213,963 US11651315B2 (en) | 2018-05-29 | 2021-03-26 | Intelligent diversification tool |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US15/991,073 US11080639B2 (en) | 2018-05-29 | 2018-05-29 | Intelligent diversification tool |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US17/213,963 Continuation US11651315B2 (en) | 2018-05-29 | 2021-03-26 | Intelligent diversification tool |
Publications (2)
Publication Number | Publication Date |
---|---|
US20190370716A1 true US20190370716A1 (en) | 2019-12-05 |
US11080639B2 US11080639B2 (en) | 2021-08-03 |
Family
ID=68693918
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US15/991,073 Active 2039-05-20 US11080639B2 (en) | 2018-05-29 | 2018-05-29 | Intelligent diversification tool |
US17/213,963 Active 2038-09-23 US11651315B2 (en) | 2018-05-29 | 2021-03-26 | Intelligent diversification tool |
Family Applications After (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US17/213,963 Active 2038-09-23 US11651315B2 (en) | 2018-05-29 | 2021-03-26 | Intelligent diversification tool |
Country Status (2)
Country | Link |
---|---|
US (2) | US11080639B2 (en) |
WO (1) | WO2019232551A1 (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20200372492A1 (en) * | 2019-05-21 | 2020-11-26 | American Express Travel Related Services Company, Inc. | Hyper-personalized identity-based financial system |
US20210406796A1 (en) * | 2020-06-30 | 2021-12-30 | Paypal, Inc. | Optimizing machine learning model total payment volume predictions using model stacking |
US20210406675A1 (en) * | 2020-06-29 | 2021-12-30 | Nozomi Networks Sagl | Method for forecasting health status of distributed networks by artificial neural networks |
US12100048B1 (en) * | 2022-08-31 | 2024-09-24 | Robert D. Arnott | System, method and computer program product for constructing a capitalization-weighted global index portfolio |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11080639B2 (en) | 2018-05-29 | 2021-08-03 | Visa International Service Association | Intelligent diversification tool |
US11397924B1 (en) * | 2019-03-27 | 2022-07-26 | Microsoft Technology Licensing, Llc | Debugging tool for recommendation systems |
US11790037B1 (en) | 2019-03-27 | 2023-10-17 | Microsoft Technology Licensing, Llc | Down-sampling of negative signals used in training machine-learned model |
US20240220982A1 (en) * | 2023-01-04 | 2024-07-04 | Mastercard International Incorporated | Transaction classification at a point of sale |
Family Cites Families (19)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CA2254944A1 (en) * | 1996-05-23 | 1997-11-27 | Citibank, N.A. | Global financial services integration system and process |
US7630986B1 (en) * | 1999-10-27 | 2009-12-08 | Pinpoint, Incorporated | Secure data interchange |
US20010005829A1 (en) * | 1999-12-10 | 2001-06-28 | Raveis William M. | System and method for managing customer relationships over a distributed computer network |
US7113932B2 (en) | 2001-02-07 | 2006-09-26 | Mci, Llc | Artificial intelligence trending system |
US20090132347A1 (en) * | 2003-08-12 | 2009-05-21 | Russell Wayne Anderson | Systems And Methods For Aggregating And Utilizing Retail Transaction Records At The Customer Level |
US20200250185A1 (en) * | 2003-08-12 | 2020-08-06 | Russell Wayne Anderson | System and method for deriving merchant and product demographics from a transaction database |
US8417715B1 (en) * | 2007-12-19 | 2013-04-09 | Tilmann Bruckhaus | Platform independent plug-in methods and systems for data mining and analytics |
US11159909B2 (en) * | 2008-02-05 | 2021-10-26 | Victor Thomas Anderson | Wireless location establishing device |
US20100332373A1 (en) * | 2009-02-26 | 2010-12-30 | Jason Crabtree | System and method for participation in energy-related markets |
US9996502B2 (en) * | 2013-03-15 | 2018-06-12 | Locus Lp | High-dimensional systems databases for real-time prediction of interactions in a functional system |
US9245299B2 (en) * | 2013-03-15 | 2016-01-26 | Locus Lp | Segmentation and stratification of composite portfolios of investment securities |
US20150032589A1 (en) | 2014-08-08 | 2015-01-29 | Brighterion, Inc. | Artificial intelligence fraud management solution |
US20150046332A1 (en) | 2014-08-08 | 2015-02-12 | Brighterion, Inc. | Behavior tracking smart agents for artificial intelligence fraud protection and management |
US20150046224A1 (en) | 2014-08-08 | 2015-02-12 | Brighterion, Inc. | Reducing false positives with transaction behavior forecasting |
US10290001B2 (en) | 2014-10-28 | 2019-05-14 | Brighterion, Inc. | Data breach detection |
US20160162917A1 (en) * | 2014-12-05 | 2016-06-09 | Zafin Labs Technologies Ltd. | System and method for evaluating and increasing customer engagement |
US10783535B2 (en) * | 2016-05-16 | 2020-09-22 | Cerebri AI Inc. | Business artificial intelligence management engine |
US11562382B2 (en) * | 2016-11-11 | 2023-01-24 | Jpmorgan Chase Bank, N.A. | System and method for providing data science as a service |
US11080639B2 (en) | 2018-05-29 | 2021-08-03 | Visa International Service Association | Intelligent diversification tool |
-
2018
- 2018-05-29 US US15/991,073 patent/US11080639B2/en active Active
-
2019
- 2019-06-04 WO PCT/US2019/035337 patent/WO2019232551A1/en active Application Filing
-
2021
- 2021-03-26 US US17/213,963 patent/US11651315B2/en active Active
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20200372492A1 (en) * | 2019-05-21 | 2020-11-26 | American Express Travel Related Services Company, Inc. | Hyper-personalized identity-based financial system |
US20210406675A1 (en) * | 2020-06-29 | 2021-12-30 | Nozomi Networks Sagl | Method for forecasting health status of distributed networks by artificial neural networks |
US11586921B2 (en) * | 2020-06-29 | 2023-02-21 | Nozomi Networks Sagl | Method for forecasting health status of distributed networks by artificial neural networks |
US20210406796A1 (en) * | 2020-06-30 | 2021-12-30 | Paypal, Inc. | Optimizing machine learning model total payment volume predictions using model stacking |
US11531946B2 (en) * | 2020-06-30 | 2022-12-20 | Paypal, Inc. | Optimizing machine learning model total payment volume predictions using model stacking |
US12100048B1 (en) * | 2022-08-31 | 2024-09-24 | Robert D. Arnott | System, method and computer program product for constructing a capitalization-weighted global index portfolio |
Also Published As
Publication number | Publication date |
---|---|
WO2019232551A1 (en) | 2019-12-05 |
US11651315B2 (en) | 2023-05-16 |
US11080639B2 (en) | 2021-08-03 |
US20210216936A1 (en) | 2021-07-15 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11080639B2 (en) | Intelligent diversification tool | |
US11741491B2 (en) | Distribution of fractional equity rewards based on purchase behavior | |
US12118440B2 (en) | Automated order execution based on user preference settings utilizing a neural network prediction model | |
JP5960887B1 (en) | Calculation device, calculation method, and calculation program | |
KR102297669B1 (en) | System for providing matching service for connecting between manufacturer and distributor | |
US20220374956A1 (en) | Natural language analysis of user sentiment based on data obtained during user workflow | |
US20170161855A1 (en) | Optimized small screen device to display visual elements in a real property dashboard involving predictive analytics | |
US20200265449A1 (en) | Systems and methods for data segmentation | |
US20140195312A1 (en) | System and method for management of processing workers | |
US20210150573A1 (en) | Real-time financial system advertisement sharing system | |
JP2019091355A (en) | Determination device, determination method and determination program | |
CN113742492A (en) | Insurance scheme generation method and device, electronic equipment and storage medium | |
US20180075468A1 (en) | Systems and methods for merchant business intelligence tools | |
US20220058744A1 (en) | Data processing systems and methods for calculating cost and benefit parameters | |
JP7053077B1 (en) | Methods and systems to support single-user action decision making | |
WO2020084712A1 (en) | Distribution program, distribution method, and distribution device | |
US20150161743A1 (en) | System and method for automatically classifying transaction information | |
US20210166318A1 (en) | Systems and methods for client profile-based sales decisions | |
JP6152215B2 (en) | Calculation device, calculation method, and calculation program | |
JP6067169B2 (en) | Calculation device, calculation method, and calculation program | |
US20240338600A1 (en) | System and method for automatically generating and presenting insight data in form of natural language | |
US20240273561A1 (en) | Machine learning technologies for filtering and generating data to reduce computational resource load | |
US11295397B1 (en) | Systems, methods, and computer program products for matching service consumers and providers | |
Pereira | An Intelligent Recommendation System for Campaigns in the Retail Business | |
WO2024166066A1 (en) | System and method for network transaction facilitator support within a website building system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
FEPP | Fee payment procedure |
Free format text: ENTITY STATUS SET TO UNDISCOUNTED (ORIGINAL EVENT CODE: BIG.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
AS | Assignment |
Owner name: VISA INTERNATIONAL SERVICE ASSOCIATION, CALIFORNIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:KAVUMPURATH, NAIJU;REEL/FRAME:046284/0677 Effective date: 20180621 |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: NON FINAL ACTION MAILED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: EX PARTE QUAYLE ACTION MAILED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: RESPONSE TO EX PARTE QUAYLE ACTION ENTERED AND FORWARDED TO EXAMINER |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: NOTICE OF ALLOWANCE MAILED -- APPLICATION RECEIVED IN OFFICE OF PUBLICATIONS |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: PUBLICATIONS -- ISSUE FEE PAYMENT VERIFIED |
|
STCF | Information on status: patent grant |
Free format text: PATENTED CASE |